File Analysis Suite enable you to quickly and efficiently reduce information risk, analyze, optimize, and secure employee access to critical data. See how in @MicroFocusSec's new #DataProtection white paper: http://ms.spr.ly/60125enQj #DataSecurity #DataPrivacy #CyberResilience
๐ฃMicroFocus
๐@malwr
๐ฃMicroFocus
๐@malwr
Finding the right decompiler for Python bytecode can be a pain because there are so many.
I compiled this table to check the supported versions
๐ฃstruppigel
๐@malwr
I compiled this table to check the supported versions
๐ฃstruppigel
๐@malwr
๐1
Malware Analysis Series has exactly 450 pages so far:
MAS_1: https://exploitreversing.com/2021/12/03/malware-analysis-series-mas-article-1/
MAS_2: https://exploitreversing.com/2022/02/03/malware-analysis-series-mas-article-2/
MAS_3: https://exploitreversing.com/2022/05/05/malware-analysis-series-mas-article-3/
MAS_4: https://exploitreversing.com/2022/05/12/malware-analysis-series-mas-article-4/
MAS_5: https://exploitreversing.com/2022/09/14/malware-analysis-series-mas-article-5/
MAS_6: https://exploitreversing.com/2022/11/24/malware-analysis-series-mas-article-6/
MAS_7: https://exploitreversing.com/2023/01/05/malware-analysis-series-mas-article-7/
๐ฃale_sp_brazil
๐@malwr
MAS_1: https://exploitreversing.com/2021/12/03/malware-analysis-series-mas-article-1/
MAS_2: https://exploitreversing.com/2022/02/03/malware-analysis-series-mas-article-2/
MAS_3: https://exploitreversing.com/2022/05/05/malware-analysis-series-mas-article-3/
MAS_4: https://exploitreversing.com/2022/05/12/malware-analysis-series-mas-article-4/
MAS_5: https://exploitreversing.com/2022/09/14/malware-analysis-series-mas-article-5/
MAS_6: https://exploitreversing.com/2022/11/24/malware-analysis-series-mas-article-6/
MAS_7: https://exploitreversing.com/2023/01/05/malware-analysis-series-mas-article-7/
๐ฃale_sp_brazil
๐@malwr
Exploit Reversing
Malware Analysis Series (MAS) โ Article 1
The first article of MAS (Malware Analysis Series) is available for reading from: (link): Soon I have enough time, so Iโll publish an HTML version of it. Have an excellent day. Alexandre Borgโฆ
If you want to know what its like to be grilled as a forensic expert watch this. From the Murdaugh trial today.
๐ฃMDCDF
Thanks. I hate it.
๐คcarandfreedomgeek2
Solid one. Another is the kid in Michigan for that shooting. Thanks for posting a link OP!
๐คbigt252002
When does the expert testimony start?
๐คFabsudNalteb
๐@malwr
๐ฃMDCDF
Thanks. I hate it.
๐คcarandfreedomgeek2
Solid one. Another is the kid in Michigan for that shooting. Thanks for posting a link OP!
๐คbigt252002
When does the expert testimony start?
๐คFabsudNalteb
๐@malwr
Indirect Prompt Injection on Bing Chat : https://greshake.github.io/
New ways of breaking app-integrated LLMs : https://github.com/greshake/llm-security
Paper : https://arxiv.org/pdf/2302.12173.pdf
๐ฃbinitamshah
๐@malwr
New ways of breaking app-integrated LLMs : https://github.com/greshake/llm-security
Paper : https://arxiv.org/pdf/2302.12173.pdf
๐ฃbinitamshah
๐@malwr
Fortinet's James Slaughter writes about the MyDoom worm (also known as Novarg and Mimail) that was first discovered in 2004, but which continues to operate well beyond expectations, with fresh infections still occurring in the wild. https://www.fortinet.com/blog/threat-research/just-because-its-old-doesnt-mean-you-throw-it-away-including-malware
๐ฃvirusbtn
๐@malwr
๐ฃvirusbtn
๐@malwr
Analysis of BlackLotus UEFI bootkit - Bypasses UEFI Secure Boot even on fully updated Windows 11 systems (It brings legit yet vulnerable binaries to the victim system to exploit CVE-2022-21894 & bypass UEFI Secure Boot) : https://www.welivesecurity.com/2023/03/01/blacklotus-uefi-bootkit-myth-confirmed/ credits @smolar_m
๐ฃbinitamshah
๐@malwr
๐ฃbinitamshah
๐@malwr
Trend Micro's Daniel Lunghi (@thehellu) details the update that Iron Tiger made to the custom malware family SysUpdate in its latest campaign. The custom malware now includes new features and has added malware infection support for the Linux platform. https://www.trendmicro.com/en_us/research/23/c/iron-tiger-sysupdate-adds-linux-targeting.html
๐ฃvirusbtn
๐@malwr
๐ฃvirusbtn
๐@malwr
Nevada Ransomware sample just surfaced on @virustotal #Rust
Sample
https://www.virustotal.com/gui/file/855f411bd0667b650c4f2fd3c9fbb4fa9209cf40b0d655fa9304dcdd956e0808/detection
https://bazaar.abuse.ch/sample/855f411bd0667b650c4f2fd3c9fbb4fa9209cf40b0d655fa9304dcdd956e0808/
Report by @RESecurity
https://www.resecurity.com/blog/article/nevada-ransomware-waiting-for-the-next-dark-web-jackpot
๐ฃcyb3rops
๐@malwr
Sample
https://www.virustotal.com/gui/file/855f411bd0667b650c4f2fd3c9fbb4fa9209cf40b0d655fa9304dcdd956e0808/detection
https://bazaar.abuse.ch/sample/855f411bd0667b650c4f2fd3c9fbb4fa9209cf40b0d655fa9304dcdd956e0808/
Report by @RESecurity
https://www.resecurity.com/blog/article/nevada-ransomware-waiting-for-the-next-dark-web-jackpot
๐ฃcyb3rops
๐@malwr
We decide to release something basic & quite simple:
A small tale on Anti-RE: Part 1
https://rixed-labs.medium.com/a-small-tale-on-anti-re-part-1-17a2cf199cf1
Have a good day ahead ๐
๐ฃRixedLabs
๐@malwr
A small tale on Anti-RE: Part 1
https://rixed-labs.medium.com/a-small-tale-on-anti-re-part-1-17a2cf199cf1
Have a good day ahead ๐
๐ฃRixedLabs
๐@malwr
Medium
A small tale on Anti-RE : Part 1
Hey readers, hope everyone is doing pretty decent. After writing the very first blog for this series of exploring anti-reverse engineeringโฆ
๐1
2023 Global Threat Report from CrowdStrike #APT #cybercrime
pdf:
https://github.com/blackorbird/APT_REPORT/blob/master/summary/2023/CrowdStrike2023GlobalThreatReport.pdf
๐ฃblackorbird
๐@malwr
pdf:
https://github.com/blackorbird/APT_REPORT/blob/master/summary/2023/CrowdStrike2023GlobalThreatReport.pdf
๐ฃblackorbird
๐@malwr
cisagov/decider: A web application that assists network defenders, analysts, and researcher in the process of mapping adversary behaviors to the MITRE ATT&CKยฎ framework.
๐ฃjnazario
I guess I'm trying to understand the place of this tool. Is this the idea if you don't have an existing TIP feeding you intelligence to source and map things on your own?
๐คasecuredlife
Can someone point me to the benefits of mapping adversary behaviours in the scope of an incident ? I always feel like I do this for higher management, rarely for myself in the scope of forensics/incident analysis. What do I miss?
๐คbromomotatata
๐@malwr
๐ฃjnazario
I guess I'm trying to understand the place of this tool. Is this the idea if you don't have an existing TIP feeding you intelligence to source and map things on your own?
๐คasecuredlife
Can someone point me to the benefits of mapping adversary behaviours in the scope of an incident ? I always feel like I do this for higher management, rarely for myself in the scope of forensics/incident analysis. What do I miss?
๐คbromomotatata
๐@malwr
GitHub
GitHub - cisagov/decider: A web application that assists network defenders, analysts, and researchers in the process of mappingโฆ
A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&CKยฎ framework. - cisagov/decider
Updated FREE Complete Reverse Engineering Tutorial to include C, C++ and Go
๐ฃMaterial_Opinion_321
๐@malwr
๐ฃMaterial_Opinion_321
๐@malwr
GitHub
GitHub - mytechnotalent/Reverse-Engineering: A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bitโฆ
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures. - mytechnotalent/Reverse-Engineering